lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 20 Jan 2022 01:09:14 -0800 From: Atish Patra <atishp@...osinc.com> To: linux-kernel@...r.kernel.org Cc: Atish Patra <atishp@...osinc.com>, Anup Patel <anup@...infault.org>, Albert Ou <aou@...s.berkeley.edu>, Atish Patra <atishp@...shpatra.org>, Damien Le Moal <damien.lemoal@....com>, devicetree@...r.kernel.org, Jisheng Zhang <jszhang@...nel.org>, Krzysztof Kozlowski <krzysztof.kozlowski@...onical.com>, linux-riscv@...ts.infradead.org, Palmer Dabbelt <palmer@...belt.com>, Paul Walmsley <paul.walmsley@...ive.com>, Rob Herring <robh+dt@...nel.org> Subject: [PATCH v3 2/6] RISC-V: Do not print the SBI version during HSM extension boot print The HSM extension information log also prints the SBI version v0.2. This is misleading as the underlying firmware SBI version may be different from v0.2. Remove the unncessary printing of SBI version. Signed-off-by: Atish Patra <atishp@...osinc.com> Reviewed-by: Anup Patel <anup@...infault.org> --- arch/riscv/kernel/cpu_ops.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/riscv/kernel/cpu_ops.c b/arch/riscv/kernel/cpu_ops.c index 1985884fe829..3f5a38b03044 100644 --- a/arch/riscv/kernel/cpu_ops.c +++ b/arch/riscv/kernel/cpu_ops.c @@ -38,7 +38,7 @@ void __init cpu_set_ops(int cpuid) #if IS_ENABLED(CONFIG_RISCV_SBI) if (sbi_probe_extension(SBI_EXT_HSM) > 0) { if (!cpuid) - pr_info("SBI v0.2 HSM extension detected\n"); + pr_info("SBI HSM extension detected\n"); cpu_ops[cpuid] = &cpu_ops_sbi; } else #endif -- 2.30.2
Powered by blists - more mailing lists